2. Lunch & Learn March 6, 2014
EVENT AGENDA
11:30 – 11:45 AM
Sign In & Welcome/Introduction
Christi Kannapel, Marketing & PR, Business Information Solutions Inc.
11:45 – 11:55 AM
BIS Overview
Phillip Long, CEO of Business Information Solutions Inc.
11:55 AM – 12:30 PM
Security
Phillip Long, CEO of Business Information Solutions Inc.
12:30 – 12:55 PM
Barracuda: Web & Spam Filters
Ally Knapp, Regional Sales Manager, Barracuda Networks Inc.
12:55 – 1:15 PM
Wrap-up, Q & A, Survey Request & Thank You
Phillip Long, CEO of Business Information Solutions Inc.
1:15 – 1:30 PM
Drawings & Giveaways
12. Information Technology
• Consulting Services
•
•
•
ISP Management
Vendor Management
Business Process Management
• Business Continuity
•
•
•
•
BIS Back Up
Disaster Recovery
BIS Cloud Sync
Highly Available Storage Solutions
13. Information Technology
•
•
•
•
Cloud Hosting Platform
BIS Hosted Exchange
VOIP Phone Systems
Network Security Management
•
•
•
Gateway Security
Desktop Security
Wireless Security
14. Vision
To accelerate the success of
our clients through giving
more value than we
accept in payment.
15. Mission
We deliver solutions to our
clients to help
them
overcome challenges
that threaten the health of
their business.
25. “Treat your password like your
toothbrush. Don’t let anybody
else use it, & get a new one
every six months.”
-Clifford Stoll
26. Top Causes of Security Breaches
•
•
•
•
•
•
Underestimating Cyber Criminals
Bad Password Practices
Loss of Device
Outdated Software
Weak Firewall
Mobile Device Security
31. Weak or stolen credentials
account for 76% of network
intrusions.
Source: Verizon 2013 Data Breach Investigations
32. 61%
Source: Sybase White Paper
report that
business use of
smartphones is
their top security
concern.
33. 25% of all workers will have
lost a mobile device
that would allow access to
confidential information.
Source: Sybase White Paper
34. Only 6%
of companies recognize the true
scale of the threat of malicious
programs that are appearing daily.
Source: 2013 Global Corporate IT Security Risks survey
45. What happened in 2013
1. Breaches
Increase in
security breaches
3. Malware
Use of malware
and root kits
continues to rise
2. The Cloud
SMB’s continue
to migrate to
cloud-based
applications
4. Mobile Users
1 in 10 remote
users infected
1 million New
iPhone and
Androids Daily
52. Dynamic Link Management
Balance traffic over multiple Internet links
Automated Failover
Failover, Round Robin, or Weighted balancing available
ISP 1
60% of HTTP
ISP 2
20% of HTTP
ISP 3
20% of HTTP
59. Questions &
Answers
Phillip Long, CEO
Business Information Solutions Inc.
251.923.4027
plong@askbis.com
James Tolosa,
Security Product Manager
Barracuda Networks Inc.